The Laws of Cryptography with Java Code
by Neal R. Wagner
Publisher: Univ. of Texas San Antonio 2003
Number of pages: 334
Description:
In this book the author is trying to find a middle ground, a gentle introduction to selected topics in cryptography without avoiding the mathematics. The material is aimed at undergraduate computer science students, but will be accessible and of interest to many others.
Download or read it online for free here:
Download link
(1.1MB, PDF)
Similar books
A brief introduction of quantum cryptography for engineers
by Bing Qi, Li Qian, Hoi-Kwong Lo - arXiv
We present the principles behind quantum key distribution and discuss a few well-known QKD protocols. We focus more on the implementation of QKD protocols rather than security analysis. Another topic covered here is the security of QKD systems.
(13761 views)
by Bing Qi, Li Qian, Hoi-Kwong Lo - arXiv
We present the principles behind quantum key distribution and discuss a few well-known QKD protocols. We focus more on the implementation of QKD protocols rather than security analysis. Another topic covered here is the security of QKD systems.
(13761 views)
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial
by Henk C. A. van Tilborg - Springer
This is a thoroughly written wonderful book on cryptography! This excellent book is warmly recommended for mathematicians, computer scientists, for professors and students, and, as a reference book, for researchers in the area of cryptography.
(15239 views)
by Henk C. A. van Tilborg - Springer
This is a thoroughly written wonderful book on cryptography! This excellent book is warmly recommended for mathematicians, computer scientists, for professors and students, and, as a reference book, for researchers in the area of cryptography.
(15239 views)
Introduction to Modern Cryptography
by Mihir Bellare, Phillip Rogaway - University of California at Davis
The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.
(16213 views)
by Mihir Bellare, Phillip Rogaway - University of California at Davis
The viewpoint taken throughout these notes is to emphasize the theory of cryptography as it can be applied to practice. This is an approach that the authors have pursued in the research, and it seems to be a pedagogically desirable approach as well.
(16213 views)
Hacking Secret Ciphers with Python
by Al Sweigart
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, etc.
(22395 views)
by Al Sweigart
The book teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers. The programs include the Caesar cipher, transposition cipher, etc.
(22395 views)